Font Size: a A A

Research On Application Of Homomorphic Technology In Mimic Defense System

Posted on:2022-10-18Degree:MasterType:Thesis
Country:ChinaCandidate:H N ZhaoFull Text:PDF
GTID:2518306740494874Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
In recent years,network technology has developed rapidly,and emerging technologies such as cloud technology,big data,and artificial intelligence are applied in daily life,but various network security risks are followed with them.In recent years,among many network security strategies,the mimic defense proposed by Academician Wu Jiang Xing has emerged an security strategy,providing new ideas and directions for protecting network security.In actual application scenarios,mimic defense services consume a lot of resources and are generally deployed and provided by cloud service providers.Although mimic defense can play a good defense against external attacks,it cannot guarantee the privacy of user data.In addition,in mimic cloud storage scenarios,the use of isomers also limits the functionality of the cloud storage system.Above are the problems that need to be solved urgently in the practical application of mimic defense.As an encryption technology that supports data ciphertext operations,homomorphic encryption technology can protect data privacy on the premise of fulfilling data operations requirements.Among them,homomorphic hashing technology is a significant field in homomorphic technology.It is used in cloud storage scenarios.It has been widely used.Aiming at the problem that the cloud server-side mimic defense system cannot protect user data privacy;this thesis introduces homomorphic encryption technology into the mimic defense system to ensure the privacy of user data.In view of the limited functions of the mimic cloud storage system,we introduce a homomorphic hash algorithm into the system to enrich the functions of the system.First,in order to solve the problem that the cloud server-side mimic defense system cannot protect user data privacy,a scheme called Homomorphic Encryption Mimic Defense Adjudication Scheme based on homomorphic encryption is proposed in this thesis.The solution is based on a mimic defense architecture,optimizes the adjudication process of the adjudication module through homomorphic encryption technology,makes full use of the characteristics of homomorphic operations,protects the privacy of user data,and improves system security.Then,using the above scheme,we build a HE-MDAS-based mimic router experimental platform for experimental analysis,and verifies the efficiency and safety of this scheme on the experimental platform.In terms of efficiency,after the introduction of homomorphic encryption in this solution,the time required for each user authentication process is still less than one millisecond,which has no impact on system performance.In terms of security,the experimental results show that under the traditional defense mechanism,malicious attackers can see the user's private information,but after homomorphic encryption is optimized,user information data is invisible to malicious attackers.Finally,in order to address the limited functionality of current mimic cloud storage servers,a scheme called Provable Data Possession scheme based on homomorphic hashing is proposed in this thesis.We analyze the security and functionality of the program from a theoretical perspective.In terms of security,the mimic defense structure solves the problem of the homomorphic hash verification program that is vulnerable to forgery,replacement,and replay.In terms of functionality,the same State hash technology can provide data integrity protection,unlimited integrity verification,data update and other functions.This thesis then analyzes the efficiency and storage cost of the scheme from an experimental point of view.In the data update scenario,the efficiency of this solution is greatly improved,the storage overhead is very small,only 1/1000 of the original data block,and because the solution only needs to verify some data blocks,the verification speed is fast,and the client the overhead is low and it can be applied to more service scenarios.
Keywords/Search Tags:Mimic Defense, Homomorphic Encryption, Dynamic Heterogeneous Redundancy, Privacy Protection, Provable Data Possession
PDF Full Text Request
Related items